Analysis

  • max time kernel
    120s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    16-10-2024 18:23

General

  • Target

    d2cee998a3dc4cdb299a99a4165e15cbda2d8ba7cf5cb7e1faa743250fae0e72N.exe

  • Size

    61KB

  • MD5

    dd0214111d6a5c93b11574d45a8e87d0

  • SHA1

    41dd265518fc106bf87f13cbda624295f4cc7245

  • SHA256

    d2cee998a3dc4cdb299a99a4165e15cbda2d8ba7cf5cb7e1faa743250fae0e72

  • SHA512

    c46e1b6c7f6f34d8e0c9d159d289a7dc27fe042c1e952ab67e73bb24c81a0ccf5c69bed7fb943f4db6443d9bf2f70a1651d088e0ae88d3c94aa6f23eb923684c

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJcbQbf1Oti1JGBQOOiQJhATBHfBo8o3PfsC:V7Zf/FAxTWoJJZENTBHfiPfsC

Malware Config

Signatures

  • Renames multiple (319) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\d2cee998a3dc4cdb299a99a4165e15cbda2d8ba7cf5cb7e1faa743250fae0e72N.exe
    "C:\Users\Admin\AppData\Local\Temp\d2cee998a3dc4cdb299a99a4165e15cbda2d8ba7cf5cb7e1faa743250fae0e72N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2248

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3692679935-4019334568-335155002-1000\desktop.ini.tmp

    Filesize

    62KB

    MD5

    a7d528ea766f6a62c7256dc48c85240c

    SHA1

    3fc134817698567ab35d0cda599fb4f7afd6ad26

    SHA256

    3f2c16e863428404cd10386dd41ac5e4f9e60a12577e1e9444707eb724764c83

    SHA512

    2e55b532a4e375ca1b7bee44a7221f6c3acfac96f32dcb2959bd7546675e45a1fc0e0aadf8858b93a427f194c187970d66fee778a23358a30e53381d4c2a9924

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    70KB

    MD5

    2ac594fb308e4754d24f1a2432e228e3

    SHA1

    1f6a12128fe00276aedf2141a58eb9f37997dbab

    SHA256

    d7b632aa65f5e6411e73cc3c02434a93fb43bcd42c978cae969e0ecd3e80a66a

    SHA512

    8a6a72c8f006bc442834df14da8cd0edca27d3f270c29c623706ed6ba1205076d514b0066a70b8cd276ef3a823a077b7891f23d17bd0c01db620df6cb13e94e7

  • memory/2248-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2248-20-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB